[ClusterLabs] [ClusterLabs Developers] [HA/ClusterLabs Summit] Key-Signing Party, 2017 Edition
jpokorny at redhat.com
Wed Sep 6 19:11:34 EDT 2017
On 24/07/17 16:59 +0200, Jan Pokorný wrote:
> On 23/07/17 12:32 +0100, Adam Spiers wrote:
>> Jan Pokorný <jpokorny at redhat.com> wrote:
>>> So, going to attend summit and want your key signed while reciprocally
>>> spreading the web of trust?
>>> Awesome, let's reuse the steps from the last time:
>>> Once you have a key pair (and provided that you are using GnuPG),
>>> please run the following sequence:
>>> # figure out the key ID for the identity to be verified;
>>> # IDENTITY is either your associated email address/your name
>>> # if only single key ID matches, specific key otherwise
>>> # (you can use "gpg -K" to select a desired ID at the "sec" line)
>>> KEY=$(gpg --with-colons 'IDENTITY' | grep '^pub' | cut -d: -f5)
>> AFAICS this has two problems: it's missing a --list-key option,
> Bummer! I've been checking the original thread(s) for responses from
> others, but forgot to check my own:
> Thanks for spotting (and the public key already sent), Adam.
>> and it doesn't handle multiple matches for 'IDENTITY'. So to make it
>> choose the newest key if there are several:
>> read IDENTITY
>> KEY=$(gpg --with-colons --list-key "$IDENTITY" | grep '^pub' |
>> sort -t: -nr -k6 | head -n1 | cut -d: -f5)
> Good point. Hopefully affected persons, allegedly heavy users of GPG,
> are capable to adapt on-the-fly anyway :-)
>>> # export the public key to a file that is suitable for exchange
>>> gpg --export -a -- $KEY > $KEY
>>> # verify that you have an expected data to share
>>> gpg --with-fingerprint -- $KEY
Thanks to the attendants and I am sorry for not responding to the ones
with on-the-edge submissions -- there was actually an active one
accepted and I've refreshed the authoritative record about the event
at https://people.redhat.com/jpokorny/keysigning/2017-ha/ accordingly
(see '*2.*' suffixes).
I'd also kindly ask the actual attendants (one person skipped the
event) to do the remaining signing work within the month at latest.
You can just grab the key of the other, already verified party from
the linked source (or the well known key server if present), sign it,
and then (IMHO) preferably send the signed key back to the original
person at one of his/her listed email, again (IMHO) preferably in an
encrypted form. There are various tools to help with this workflow at
scale, such as PIUS (https://github.com/jaymzh/pius) to give an
example, but YMMV.
May the web of trust be with you.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 819 bytes
Desc: not available
More information about the Users